Threats
Alert: Ransomware Can Slither in If Your Passwords Are Weak
Email is a very effective way of distributing all sorts of malware, and there are a few very good reasons for this. First of all, everybody has an email account. Although we have other means of communication, we still... Read more
Hackers Have No Heart: Your New Pacemaker Could Be a Ticking Time Bomb
Shocking as it may sound, attacks on health devices do occur, and they could threaten your personal security. Unfortunately, in recent years hospitals became one of the biggest cybercriminals' targets as the... Read more
Infamous Trickbot Trojan Is Now Capable of Stealing Credentials from Web Browsers Too
In a little over two years, Trickbot has been transformed from a newcomer to an established name in the online threat landscape. For some reason, many people continue to classify it as a banking trojan, but those who... Read more
You Must Teach Your Employees About These Cybersecurity Issues
Every employer will agree – the backbone of a successful business is a great group of employees. Whether you are managing a smaller group of professionals or multiple divisions across the country or even the world,... Read more
How to Encrypt Your Files on Mac Computers
How secure are Mac computers? Apple's Mac computers have a reputation for being safer than Windows PCs, but is that true? Maybe, but not nearly as much as you may think. Why do hackers infect us with malware? For the... Read more
2018's Most Common Cyber Attacks You Should Know About
Cyber attacks are more common that you might think. We have quite a few months to go before the year is over and we can start assessing cyber attacks of 2018; however, we know for a fact that 2017 was the worst year... Read more
The Hacker Behind WeChat Ransomware Is Caught After Stealing Passwords from 50,000 Users
The prospect of using computers to illegally earn money from regular people seems appealing to quite a few wannabe criminals. Predictably, some are better than others. Luo Moumou, a Chinese individual who authored a... Read more
Top Essential Preparation Tips to Avoid a Web Security Breach
Security breaches within data management systems are a lot more common than we would like to think. We have already discussed several important security breaches topics throughout this year, including the Pentagon... Read more
Top 5 Reasons to Use a Reliable Ad Blocker
An ad blocker is an application that removes or changes advertisements when surfing the Internet. Therefore, we could say it is a number one program for anyone who hates seeing annoying banners, pop-ups, or other... Read more
At Least 145 Google Play Apps Could Install Keyloggers to Steal Passwords
Sometimes a malicious program could hide in plain sight for a very long time before it gets taken care of. Having that in mind, we would like to talk about how Google had to remove 145 apps from Google Play because... Read more
New iPhones Could Be Delayed After Apple Chip Maker Suffers Malware Outbreak
Taiwan Semiconductor Manufacturing Company (TSMC), one of the biggest semiconductor manufacturers in the world, got hit by what has been described as a malware outbreak on August 3 which forced it to temporarily halt... Read more
Top-Clicked Phishing Report Shows How Easily Computer Users Are Scammed
Phishing shouldn't be such an effective attack in theory. When you take a closer look and consider a few things, you'll see that in a typical scenario, there are far too many easy-to-notice factors that give the... Read more
Be Aware of Things that claim to Enhance the Cybersecurity of Your Business
When we talk about cybersecurity, we can divide it into two big sections: personal cybersecurity and business cybersecurity. Both spheres are highly interconnected, but it is a no-brainer to realize that cyber threats... Read more
DarkGate Miner Could Put Your Passwords at Risk - How to Protect Yourself
Adi Zeligson and Rotem Kerner, two security researchers working for enSilo, recently saw that a new malware family called DarkGate was flying around. Most security products were not detecting it, so they decided to... Read more
24,000 Malicious Mobile Apps Are Blocked Every Day. What Are the Risks of Using One?
Did you know that information stealing mobile apps exist? Did you know that hundreds and thousands of malicious apps are blocked every day? Yes, apps that are meant to assist you and offer you great services can be... Read more
7 Most Important Online Security Practices Everyone Should Follow
There were close to 4,200,000,000 active Internet users by the end of 2017, according to the statistics provided by internetworldstats.com, and this number is likely to increase by the end of 2018. With more than half... Read more
The Best WordPress Security Practices to Protect Your Website from Hackers
Websites get hacked as often as users' accounts, be it a blog, an eCommerce website, or a portfolio. This is especially true for WordPress websites. The WordPress content management system (CMS) continues to be the... Read more
How to Protect Your Computer from a Ransomware Attack
It must be said that as far as illegal money-making schemes on the Internet go, ransomware operations seem to be among the most clever ones. If it's done correctly, it's the (nearly) perfect crime because you... Read more